CrowdStrike Falcon Endpoint Protection Enterprise
CrowdStrike Falcon Endpoint Protection Enterprise
Code: CR000002In stock.ManufacturerCrowdStrike-
FALCON ENTERPRISE
Unifies the technologies required to successfully stop breaches, including true next-gen antivirus and endpoint detection and response (EDR), managed threat hunting, and threat intelligence automation, delivered via a single lightweight agent.
Falcon Enterprise
Unified NGAV, EDR, managed threat hunting
and integrated threat intelligence
FALCON PREVENT
Next-Generation Antivirus
Read more...
FALCON X
Threat Intelligence
Read more...
FALCON DEVICE
CONTROL
USB Device Control
Read more...
FALCON FIREWALL MANAGEMENT
Host Firewall Control
Read more...
FALCON INSIGHT
Endpoint Detection & Responce
Read more...
FALCON OVERWATCH
Threat hunting
Read more...
FALCON DISCOVER
IT Hygiene
AVAILABLE WITH
FALCON ELITE
Read more...
FALCON IDENTITY PROTECTION
Integrated Identity Security
AVAILABLE WITH
FALCON ELITE
Read more...
CROWDSTRIKE
SERVICES
Incident Response &
Proactive Services
LEARN MORE ABOUT
CROWDSTRIKE SERVICES
Read more...
Flexible Bundles: ✔ Included Component ✚ Elective Component
FALCON ENDPOINT PROTECTION ENTERPRISEIntegrated Threat Intelligence
Next Generation Antivirus
Managed Threat Hunting Endpoint Detectionand Response
BUSINESS VALUE
Unify NGAV and EDR for full endpoint protection
Enable threat hunting and real time visibility
Uncover stealthy attacks
Speed investigation and response
Automatic analysis and orchestrated IOC sharing
FEATURES AND CAPABILITIESVISIBILITY & EDR
Continuous monitoring
Raw event capture
5 seconds searches
Real-time response
Complete visibility, context and attribution
USB device visibility
Firewall visibility
PREVENTION
Machine learning
IOAs behavioral prevention
Exploit blocking
Custom hash blocking
Protection on and off the network
USB device control
Firewall configuration management
MANAGED THREAT HUNTING
24/7 managed threat hunting
Expert threat hunters
Identify emerging threats
In-app and email notifications
INTEGRATED INTELLIGENCE
Automatic malware analysis
Automatic attribution
Automatic IOC generation
IDENTITY PROTECTION
Hybrid identity landscape visibility
Auto-classify Identity enterprise wide
Real-time lateral movement and anomalous authentication detection
Enables proactive identity based threat hunting